Using biometrics to prevent financial crime
November 2017, Access Control & Identity Management, Integrated Solutions
Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
Wayne Olsen, Datacentrix security business unit manager.
There’s no doubt that fraud in the workplace is a broad-ranging topic, but one of the most egregious kinds is surely financial fraud. It’s this type of fraud that directly hits the company’s bottom line. So let’s look at mitigating those cybercrime efforts that are directed at local organisations with financial crime as their primary strategy.
What is financially-motivated cybercrime?
Electronic fraud is really just the latest evolution of traditional crime. Many professional criminal syndicates have shifted their focus away from the old-world tactics of holding up banks, running black-market importing businesses or trading drugs, for instance. They’ve chosen an often far softer target: capitalising on the lack of security and stringent processes within many companies.
In recent years we’ve seen the art of social engineering become ever-more sophisticated, as fraudsters carefully gather data-sets from ‘helpful’ staff, building up this data to ultimately impersonate different parties. Armed with enough information, they may impersonate a supplier requesting that their bank details are changed; or they impersonate the CFO in requesting that payment orders are executed by his staff. Many have defined this kind of highly-targeted identity theft as ‘whaling’ – an evolved form of phishing.
The basics brilliantly
Many firms are investing tens of millions of rands in sophisticated security tools that deal with technical threats coming from all directions, but fail to effectively prevent financial losses because the basic processes are just not designed effectively.
Whatever the size of one’s company, in the finance department it is essential to segregate financial duties between different people. We often see firms stumbling due to a lack of basic rigour (such as mandating that a purchase order be checked with business unit managers before invoices are released for payment, or confirming that an employee has been fully off-boarded by implementing checks and balances across Payroll, HR, IT and other areas).
We’re generally familiar with the use of biometrics for basic, physical access and ‘time and materials’ record-keeping, but the opportunities for biometrics extend far further than this:
Each transaction can be biometrically-signed, so there is absolutely no doubt about who authorised a particular payment. With advanced biometrics solutions, full audit logs are created, tracing the journey of a particular transaction through its various stages of approval.
These audit logs can be introduced into a court of law if necessary, as they legally bind the actor (for example the financial administrator) to the transaction. This allows organisations to reach a level of certainty and accountability that was previously not possible with less-secure, password-based systems.
By positively connecting a physical person to each specific transaction, firms can eliminate the problems of passwords that are divulged or shared, or smartcards, tokens and one-time PIN numbers that can also be passed between individuals.
A biometrics approach can be used consistently across various enterprise applications – to deliver legally-valid transaction evidence, and essentially to act as an impartial witness to sensitive business transactions. By introducing this technology alongside policies (such as payment value thresholds for different members of staff), organisations can not only ensure that any fraud losses are traced back to particular individuals, but they can prevent fraud from happening in the first place.
For more information on Datacentrix’ fraud management offerings, please visit http://www.datacentrix.co.za/electronic-fraud-management.html
- Awareness and trust in context
November 2017, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
Markus Krauss, senior director, Digital Identity and Security, CA Technologies, spoke to Hi-Tech Security Solutions about making identity work for people and things.
- People on the move
November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
- Access and identity: looking ahead
November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
- A question of trust and accountability
November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
- Trusting your privilege
November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
- Involve users in design
November 2017, Elvey, Access Control & Identity Management
One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution.
- Integrating surveillance and access
November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
- The access edge
November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
- Home run for integrated security
November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
- Facing the future
November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
- The growth of biometrics
November 2017, ZKTeco, Access Control & Identity Management
Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.
- Access on the edge
November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.